Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64517: CWE-287: Improper Authentication in trifectatechfoundation sudo-rs

0
Medium
VulnerabilityCVE-2025-64517cvecve-2025-64517cwe-287
Published: Wed Nov 12 2025 (11/12/2025, 22:08:29 UTC)
Source: CVE Database V5
Vendor/Project: trifectatechfoundation
Product: sudo-rs

Description

sudo-rs is a memory safe implementation of sudo and su written in Rust. With `Defaults targetpw` (or `Defaults rootpw`) enabled, the password of the target account (or root account) instead of the invoking user is used for authentication. sudo-rs starting in version 0.2.5 and prior to version 0.2.10 incorrectly recorded the invoking user’s UID instead of the authenticated-as user's UID in the authentication timestamp. Any later `sudo` invocation on the same terminal while the timestamp was still valid would use that timestamp, potentially bypassing new authentication even if the policy would have required it. A highly-privileged user (able to run commands as other users, or as root, through sudo) who knows one password of an account they are allowed to run commands as, would be able to run commands as any other account the policy permits them to run commands for, even if they don't know the password for those accounts. A common instance of this would be that a user can still use their own password to run commands as root (the default behaviour of `sudo`), effectively negating the intended behaviour of the `targetpw` or `rootpw` options. Version 0.2.10 contains a patch for the issue. Versions prior to 0.2.5 are not affected, since they do not offer `Defaults targetpw` or `Defaults rootpw`.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/18/2026, 09:43:37 UTC

Technical Analysis

CVE-2025-64517 is a vulnerability classified under CWE-287 (Improper Authentication) affecting sudo-rs, a Rust-based implementation of the sudo and su utilities. The flaw exists in versions 0.2.5 up to but not including 0.2.10 when the sudo-rs configuration enables 'Defaults targetpw' or 'Defaults rootpw'. These options require the password of the target account (or root) rather than the invoking user for authentication. However, due to a logic error, sudo-rs records the invoking user's UID in the authentication timestamp rather than the authenticated target user's UID. This timestamp is used to bypass subsequent authentication prompts within the same terminal session. Consequently, a user with high privileges who knows the password of one allowed target account can execute commands as any other account permitted by the sudo policy without knowing their passwords. This effectively undermines the security intent of the 'targetpw' and 'rootpw' options, allowing privilege escalation and unauthorized command execution. The vulnerability does not affect versions prior to 0.2.5, as these options were not available, and is fixed in version 0.2.10. The CVSS 3.1 score of 4.4 reflects a local attack vector requiring high privileges but with no confidentiality or availability impact, and no user interaction needed. No public exploits have been reported. The flaw highlights the importance of correct UID tracking in authentication mechanisms to prevent unauthorized access escalation.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized privilege escalation on systems running affected sudo-rs versions with 'targetpw' or 'rootpw' enabled. Attackers or malicious insiders with elevated sudo privileges and knowledge of one target account password could execute commands as other privileged accounts, including root, bypassing intended authentication controls. This could lead to unauthorized system modifications, lateral movement, and potential compromise of sensitive data or critical infrastructure. The impact is particularly significant in environments with strict access controls relying on target account password verification to segregate privileges. Since sudo-rs is a relatively new implementation, its adoption may be limited but growing in security-conscious organizations valuing Rust's memory safety. European entities in sectors such as finance, government, and critical infrastructure that deploy sudo-rs could face increased risk of insider threats or privilege abuse. The medium CVSS score reflects moderate risk but the potential for serious integrity violations in sensitive environments.

Mitigation Recommendations

European organizations should immediately audit their systems to identify installations of sudo-rs versions between 0.2.5 and 0.2.9. They must upgrade all affected instances to version 0.2.10 or later, where the authentication timestamp handling bug is fixed. Until upgrades are applied, consider disabling the 'Defaults targetpw' and 'Defaults rootpw' options to prevent reliance on the flawed authentication mechanism. Implement strict sudo policies limiting which users have high privileges and require password authentication. Monitor sudo usage logs for unusual patterns indicating potential abuse of authentication bypass. Employ multi-factor authentication where possible to add an additional layer of verification beyond passwords. Conduct regular security assessments and penetration testing focused on privilege escalation vectors. Finally, maintain awareness of updates from trifectatechfoundation and subscribe to vulnerability advisories to promptly address future issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-05T21:15:39.400Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691509abe6b3e50d509f11d4

Added to database: 11/12/2025, 10:26:51 PM

Last enriched: 2/18/2026, 9:43:37 AM

Last updated: 3/24/2026, 12:53:01 PM

Views: 174

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses